You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/advisor/advisor-high-availability-recommendations.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Azure Advisor helps you ensure and improve the continuity of your business-criti
12
12
13
13
## Check the version of your Check Point network virtual appliance image
14
14
15
-
Advisor can identify whether your virtual machine is running a version of the Check Point image that has been known to lose network connectivity during platform servicing operations. The Advisor recommendation will help you upgrade to a newer version of the image that addresses this problem. This check will ensure business continuity through better network connectivity.
15
+
Advisor can identify whether your virtual machine is running a version of the Check Point image that has been known to lose network connectivity during platform servicing operations. The Advisor recommendation helps you upgrade to a newer version of the image that addresses this problem. This check ensures business continuity through better network connectivity.
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-troubleshoot-log.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ If your log search alert didn't fire when it should have, check the following it
42
42
43
43
1.**Are the actions muted or was the alert rule configured to resolve automatically?**
44
44
45
-
A common issue is that you think that the alert didn't fire, but the rule was configured so that the alert would not fire. See the advanced options of the [log search alert rule](./alerts-create-log-alert-rule.md) to verify that both of the following are not selected:
45
+
A common issue is that you think that the alert didn't fire, but the rule was configured so that the alert wouldn't fire. See the advanced options of the [log search alert rule](./alerts-create-log-alert-rule.md) to verify that both of the following aren't selected:
46
46
* The **Mute actions** checkbox: allows you to mute fired alert actions for a set amount of time.
47
47
***Automatically resolve alerts**: configures the alert to only fire once per condition being met.
48
48
@@ -149,7 +149,7 @@ A configured [log alert rule in Azure Monitor](./alerts-log.md) might be trigger
149
149
150
150
Logs are semi-structured data and are inherently more latent than metrics. If you're experiencing many misfires in fired alerts, consider using [metric alerts](alerts-types.md#metric-alerts). You can send data to the metric store from logs using [metric alerts for logs](alerts-metric-logs.md).
151
151
152
-
Log search alerts work best when you are try to detect specific data in the logs. They are less effective when you are trying to detect lack of data in the logs, like alerting on virtual machine heartbeat.
152
+
Log search alerts work best when you're trying to detect specific data in the logs. They're less effective when you're trying to detect lack of data in the logs, like alerting on virtual machine heartbeat.
153
153
154
154
155
155
## Error messages when configuring log search alert rules
@@ -164,24 +164,24 @@ If you receive this error message when creating or editing your alert rule query
164
164
165
165
See [Manage access to Log Analytics workspaces](../logs/manage-access.md) to learn more about permissions.
166
166
167
-
### One-minute frequency is not supported for this query
167
+
### One-minute frequency isn't supported for this query
168
168
169
-
There are some limitations to using a oneminute alert rule frequency. When you set the alert rule frequency to one minute, an internal manipulation is performed to optimize the query. This manipulation can cause the query to fail if it contains unsupported operations.
169
+
There are some limitations to using a one-minute alert rule frequency. When you set the alert rule frequency to one minute, an internal manipulation is performed to optimize the query. This manipulation can cause the query to fail if it contains unsupported operations.
170
170
171
171
For a list of unsupported scenarios, see [this note](https://aka.ms/lsa_1m_limits).
172
172
173
173
### Failed to resolve scalar expression named <>
174
174
175
175
This error message can be returned when creating or editing your alert rule query if:
176
176
177
-
- You are referencing a column that doesn't exist in the table schema.
178
-
- You are referencing a column that wasn't used in a prior project clause of the query.
177
+
- You're referencing a column that doesn't exist in the table schema.
178
+
- You're referencing a column that wasn't used in a prior project clause of the query.
179
179
180
180
To mitigate this, you can either add the column to the previous project clause or use the [columnifexists](https://learn.microsoft.com/azure/data-explorer/kusto/query/column-ifexists-function) operator.
181
181
182
-
### ScheduledQueryRules API is not supported for read only OMS Alerts
182
+
### ScheduledQueryRules API isn't supported for read only OMS Alerts
183
183
184
-
This error message is returned when trying to update or delete rules created with the legacy API version by using the Azure Portal.
184
+
This error message is returned when trying to update or delete rules created with the legacy API version by using the Azure portal.
185
185
186
186
1. Edit or delete the rule programmatically using the Log Analytics [REST API](./api-alerts.md).
187
187
2. Recommended: [Upgrade your alert rules to use Scheduled Query Rules API](./alerts-log-api-switch.md) (legacy API is on a deprecation path).
0 commit comments